DERUUA

Latest news about information security threats and incidents

Prevention of security threats and incidents described below is wiser and cheaper than forensic investigations and mitigation of the consequences of a cyber attack. You can get evidence of this fact from the news below. Use our services to find and mitigate your security vulnerabilities before the security threat agents find them.


Reimagining risk management to mitigate looming economic dangers

In a volatile market environment and with the edict to “do more with less,” many financial institutions are beginning efforts to reengineer their risk management programs , according to a new survey by Deloitte Global, with emerging technologies in the driver’s seat. (more)

Posted on 24 January 2019 9:33 am


Cyberattacks fueled by geopolitical tension are increasing

Billions of personal records were stolen in 2018 , unearthed in breaches that successfully targeted household names in government, technology, healthcare, travel and hospitality. Compounding the problem has been increased geopolitical tension between western democracies and countries like Russia, China and North Korea. (more)

Posted on 24 January 2019 9:22 am


Popular free Android VPN apps on Play Store contain malware

If you want to ensure optimal privacy while surfing the web, a VPN (virtual private network) is the only reliable option. In this regard, a majority of web and smartphone users rely upon free VPN services, which according to the latest research is a risky step. (more)

Posted on 24 January 2019 9:02 am


Cohesity backup solution prevents, detects, and responds to ransomware attacks

News and articles about cyber security, information security, vulnerabilities, exploits, patches, releases, software, features, hacks, laws, spam, viruses, malware, trojans. Cohesity backup solution prevents, detects, and responds to ransomware attacks. (more)

Posted on 24 January 2019 7:37 am


How the U.S. Govt. Shutdown Harms Security

The ongoing partial U.S. federal government shutdown is having a tangible, negative impact on cybercrime investigations, according to interviews with federal law enforcement investigators and a report issued this week by a group representing the interests of FBI agents. (more)

Posted on 24 January 2019 7:15 am


Windows Contacts Remote Code Execution Zero-Day Gets Micropatch

Another zero-day vulnerability in Windows receives a temporary fix today, as the 0patch platform added code for a bug in Windows Contacts app that allows remote execution of arbitrary code. Reported via the Zero Day Initiative (ZDI) program by security researcher John Page , the glitch is in the way files storing contact information (. (more)

Posted on 24 January 2019 5:07 am


France sees Huawei 'risks' for 5G networks: foreign minister

By AFP 8 hours ago in Technology French Foreign Minister Jean-Yves Le Drian warned Wednesday of "risks" in deploying next-generation 5G wireless networks using equipment from the Chinese telecommunications giant Huawei. "We are well aware of the risks... (more)

Posted on 24 January 2019 4:44 am


Inner Circle Podcast Episode 019 – Kamal Shah Talks about Cybersecurity across the Container Lifecycle

Podcast: Subscribe: Cybersecurity is generally an all or nothing game. Attackers are adept at finding and exploiting the weak link, so letting your guard down in any area is unwise. Kamal Shah, CEO of StackRox , joins me for this episode of the Inner Circle Podcast and we discuss the importance of.... (more)

Posted on 24 January 2019 4:25 am


Cisco Releases Security Updates

Cisco has released security updates to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system. The National Cybersecurity and Communications Integration Center (NCCIC), part of the Cybersecurity and Infrastructure.... (more)

Posted on 24 January 2019 1:41 am


Victim Count in Alaska Health Department Breach Soars

Alaska state authorities are notifying up to 700,000 individuals of a health department data breach that originally was reported to federal regulators last June as affecting only 501 people. See Also: Sunset of Windows Server 2008: Migrate with Docker The spike in potential victims is an extreme.... (more)

Posted on 24 January 2019 12:48 am


Israeli CERT will be hosting a FIRST-TC Conference at the David InterContinental Hotel in Tel Aviv, Israel

For the first time, CERT-IL will be hosting a FIRST-TC Conference at the David InterContinental Hotel in Tel Aviv, Israel on February 19-21, 2019. The conference has an impressive lineup of speakers from leading global technology companies and will focus on incident response and the importance of.... (more)

Posted on 23 January 2019 10:10 pm


PHP PEAR Site Hacked; Tainted Package Available for Months

The home of the Security Bloggers Network. PHP PEAR Site Hacked; Tainted Package Available for Months PHP PEAR Site Hacked; Tainted Package Available for Months. The official PHP Extension and Application Repository (PEAR) website has been shut down after an apparent hack caused the original PHP.... (more)

Posted on 23 January 2019 8:11 pm


Mitsubishi Electric develops cyber defense technology for connected cars - Green Car Congress

Mitsubishi Electric Corporation has developed a multi-layered defense technology that protects connected vehicles from cyber attacks by strengthening their head unit’s defense capabilities. Vehicles with communication functions provide connections to the internet and/or mobile devices such as smartphones. (more)

Posted on 23 January 2019 7:22 pm


WhiteHat Security Launches New Software Testing Products

Application security firm WhiteHat Security on Tuesday announced the general availability of a new product line designed to help organizations conduct comprehensive code analysis. The new line, named Essentials , includes the Sentinel Source Essentials Edition and Sentinel SCA Essentials Edition products. (more)

Posted on 23 January 2019 6:53 pm


5 Malware Trends: Emotet is Hot, Cryptominers Decline

Infections of consumer systems by the most prevalent cryptominer, BitCoinMiner, have plummeted to levels not seen since early 2017, Malwarebytes reports. During 2018, Emotet malware, followed by a backdoor called Vools that can also drop malware onto infected systems, were the top two pieces of.... (more)

Posted on 23 January 2019 6:08 pm


Chinese Hacker Publishes PoC for Remote iOS 12 Jailbreak On iPhone X

Here we have great news for all iPhone Jailbreak lovers and concerning one for the rest of iPhone users. A Chinese cybersecurity researcher has today revealed technical details of critical vulnerabilities in Apple Safari web browser and iOS that could allow a remote attacker to jailbreak and compromise victims’ iPhoneX running iOS 12. (more)

Posted on 23 January 2019 5:29 pm


En garde! 'Cyber-war has begun' – and France will hack first, its defence sec declares

Parly-vous cyber-security? No plan to surrender, military bug bounty coming FIC2019 France’s defence secretary Florence Parly today declared: “Cyber war has begun.” And she said the Euro nation's military will use its “cyber arms as all other traditional weapons… to respond and attack,” as well as setting up a military bug bounty program. (more)

Posted on 23 January 2019 4:58 pm


Attivo Networks® Names Chris Roberts as Chief Security Strategist

One of the World’s Foremost Experts on Counter Threat Intelligence Joins C-Suite at Rapidly Growing Deception Technology Leader. FREMONT, Calif. January 23, 2019 Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, today named Chris Roberts, one of the world’s.... (more)

Posted on 23 January 2019 4:52 pm


DHS Issues More Urgent Warning on DNS Hijacking

/CC) Wikipedia The U.S. Department of Homeland Security says executive branch agencies are being targeted by attacks aimed at modifying Domain Name System records, which are critical for locating websites and services. See Also: On Tuesday, DHS issued an emergency directive giving government.... (more)

Posted on 23 January 2019 4:37 pm


DHS issues emergency order to prevent agency DNS hijacking

. FedScoop: The Department of Homeland Security has issued a rare “emergency” directive ordering federal civilian agencies to secure the login credentials for their internet domain records. DHS issued the order Tuesday afternoon out of concern that federal agencies could be vulnerable to.... (more)

Posted on 23 January 2019 4:19 pm


Cybercrime to Cost $5.2 Trillion over Next 5 Years; High-Tech Industry Most at Risk

Businesses are struggling to develop cyber resilience to fend off attacks as they seek to create flawless operations and to scale systems. Efficient cybersecurity in an advancing digital economy is no easy goal, as many factors are at play, including third-party risks and increased attack surface,.... (more)

Posted on 23 January 2019 3:55 pm


PewDiePie-spammers and whale-flingers exploit hole in Atlas game

The newly launched Atlas game has pirates, a fountain of youth, ramshackle sloops, naval battles, submarines, and guillotines. What Grapeshot Games’s MMO (Massively Multiplayer Online) game is not supposed to have: a flood of whales, spawning in water, on land and sometimes in mid-air. Image from StreamerHouse playing ATLAS, on Twitch. (more)

Posted on 23 January 2019 3:45 pm


DHS Issues Emergency Directive on DNS Infrastructure Tampering

DHS Issues Emergency Directive on DNS Infrastructure Tampering. The Department of Homeland Security (DHS) has issued an emergency directive that requires federal agencies to mitigate the threat of Domain Name System (DNS) infrastructure tampering. In “ Emergency Directive 19-01 ,” DHS explains.... (more)

Posted on 23 January 2019 2:48 pm


New malware found using Google Drive as its command-and-control server

. Jan 23, 2019 Since most security tools also keep an eye on the network traffic to detect malicious IP addresses, attackers are increasingly adopting infrastructure of legitimate services in their attacks to hide their malicious activities. Cybersecurity researchers have now spotted a new malware.... (more)

Posted on 23 January 2019 1:57 pm


Hackers Wield Commoditized Tools to Pop West African Banks (InfoRiskToday)

Source: Symantec. Security firm Symantec warns that at least four online attack campaigns, which all may be the work of one group, have been targeting banks in West Africa since mid-2017. See Also: Key Drivers to Enable Digital Transformation in Financial Services The attack campaigns have targeted.... (more)

Posted on 23 January 2019 12:19 pm


Remote Code Execution Flaw in APT Linux Package Manager allows man-in-the-middle attack

Remote Code Execution Flaw in APT Linux Package Manager allows man-in-the-middle attack. Yesterday a remote code execution bug was found in the APT high-level package manager used by Debian, Ubuntu, and other related distributions. Max Justicz , the security researcher who discovered the bug, says.... (more)

Posted on 23 January 2019 11:54 am


Should enterprises delay efforts to remediate most vulnerabilities?

Companies today appear to have the resources needed to address all of their high-risk vulnerabilities. The research demonstrates that companies are getting smarter in how they protect themselves from today’s cyber threats, improving operational efficiency and resource allocation, while best managing risk. (more)

Posted on 23 January 2019 10:09 am


Most out of date applications exposed: Shockwave, VLC and Skype top the list

More than half (55%) of PC applications installed worldwide are out-of-date, making PC users and their personal data vulnerable to security risks. Avast’s PC Trends Report 2019 found that users are making themselves vulnerable by not implementing security patches and keeping outdated versions of popular applications on their PCs. (more)

Posted on 23 January 2019 10:09 am


Apple Fixes Numerous Security Vulnerabilities in iOS, macOS, and More

News and articles about cyber security, information security, vulnerabilities, exploits, patches, releases, software, features, hacks, laws, spam, viruses, malware, trojans. Apple Fixes Numerous Security Vulnerabilities in iOS, macOS, and More. Today Apple released updates for their core products.... (more)

Posted on 23 January 2019 8:07 am


House IT Subcommittee will dissolve into Subcommittee on Government Operations

Written by Jan 23, 2019 | FEDSCOOP. Carten Cordell As the new Democrat-led House Committee on Oversight and Reform takes shape, Rep. Gerry Connolly, D-Va., said Tuesday there will be a shake-up in the subcommittee structure around federal IT oversight. (more)

Posted on 23 January 2019 8:03 am


Stealthy New DDoS Attacks Target Internet Service Providers

Adversaries took advantage of the large attack surface of large communications networks to spread small volumes of junk traffic across hundreds of IP prefixes in Q3 2018, Nexusguard says. Distributed denial-of-service attacks targeting large Internet service providers surged in the third quarter of.... (more)

Posted on 23 January 2019 8:01 am


Varonis Data Security Platform 7.0 released

News and articles about cyber security, information security, vulnerabilities, exploits, patches, releases, software, features, hacks, laws, spam, viruses, malware, trojans. Varonis Systems releases new features in version 7.0 of the Varonis Data Security Platform to help organizations protect.... (more)

Posted on 23 January 2019 6:33 am


HITRUST expands to deliver ‘One framework, one assessment approach’ globally

HITRUST unveiled that it is expanding its engagement in Europe and Asia to aid organizations in addressing their global information risk management and compliance priorities, including General Data Protection Regulation (GDPR) and the Singapore Personal Data Protection Act (PDPA) requirements by.... (more)

Posted on 23 January 2019 5:50 am


China 'compressing' technology gains: US intel official

Reaping the benefits of sending tens of thousands of students and researchers to the United States, and a determined policy to buy and steal US technology, Beijing has "compressed the timeframe" for catching up, and now has "remarkable" capabilities, the official told journalists on condition of anonymity. (more)

Posted on 23 January 2019 4:51 am


Community Project Crushes 100,000 Malware Sites in 10 Months

Nearly 100,000 malware distribution websites have been identified and taken down over the course of 10 months as part of an abuse.ch project called URLhaus. Launched at the end of March 2018 with the purpose of collecting and sharing URLs used for malware distribution, the project has already proven.... (more)

Posted on 23 January 2019 12:52 am


Cloud, services fuel IBM's profit beat, robust outlook; shares jump

(Reuters) - IBM Corp beat analysts’ fourth-quarter earnings estimates and forecast full-year profit above expectations on Tuesday, as the company benefits from its focus on newer businesses such as cloud, software and services, sending its shares up about 7 percent. (more)

Posted on 23 January 2019 12:46 am


Adobe Releases Security Updates

News and articles about cyber security, information security, vulnerabilities, exploits, patches, releases, software, features, hacks, laws, spam, viruses, malware, trojans. Original release date: January 22, 2019. Adobe has released security updates to address vulnerabilities in Adobe Experience Manager. (more)

Posted on 22 January 2019 9:11 pm


Enterprises must be prepared for mega cyber attacks: Check Point CEO

Bangkok, Jan 22 (IANS) The world is on the brink of facing mega cyber attacks and the enterprises need to be prepared more than ever before, a top executive of Israel-based cybersecurity solution provider Check Point Software Technologies said here on Tuesday. (more)

Posted on 22 January 2019 8:25 pm


Huawei calls for swift end to case of executive arrested in Canada

The United States has told Canada it will request Meng’s extradition, but has not said when it will do so, David MacNaughton, Canada’s ambassador to the U.S., said in a Globe and Mail interview on Monday. “We are following this issue closely but haven’t had direct contact with the authorities. We will call for a quick conclusion for Ms. (more)

Posted on 22 January 2019 8:00 pm


Cyber Security: Dualog Launches New Service

Dualog has taken shipboard cyber security to a higher level by launching a new service that promises to protect vessels and their onboard IT systems, a literal first line of defense, blocking malware and unwanted data traffic at the DNS level. This extra level is particularly important factor if you.... (more)

Posted on 22 January 2019 7:58 pm


Incident Response Steps Comparison Guide

[ This was originally published What is Incident Response? It’s a plan for responding to a cybersecurity incident methodically. If an incident is nefarious, steps are taken to quickly contain, minimize, and learn from the damage. Not every cybersecurity event is serious enough to warrant investigation. (more)

Posted on 22 January 2019 7:13 pm


Data Privacy Day

January 28 is Data Privacy Day (DPD), an annual effort to promote data privacy awareness and education. This year’s DPD events, sponsored by the National Cyber Security Alliance (NCSA), focus around the theme, A New Era in Privacy. The NCSA Stay Safe Online website will feature a live stream of the.... (more)

Posted on 22 January 2019 5:28 pm


Dräger Infinity Delta

Advisory Document (more)

Posted on 22 January 2019 5:05 pm


Johnson Controls Facility Explorer

Advisory Document (more)

Posted on 22 January 2019 5:00 pm


MySQL Design Flaw Could Allow Malicious Servers to Steal Files

A design flaw has been discovered in the file transfer interaction between a client host and a MySQL server. The bug allows threat actors operating a malicious MySQL server to obtain any data the connected client has read access to. In short, due to this design flaw, a malicious MySQL server can be deployed to steal files from clients. (more)

Posted on 22 January 2019 4:50 pm


Parrot 4.5 Released With Linux 4.19, Metasploit 5.0 and More Dev Tools

News and articles about cyber security, information security, vulnerabilities, exploits, patches, releases, software, features, hacks, laws, spam, viruses, malware, trojans. Parrot 4.5 Released with major changes with new Linux kernel version, includes support for Metasploit 5.0 and more dev tools come pre-installed. (more)

Posted on 22 January 2019 4:30 pm


Dharma Gang Pushes Phobos Crypto-Locking Ransomware

Ransom note dropped by Phobos crypto-locking ransomware (Source: Coveware) New strains of ransomware are being distributed by attackers who gain remote access to organizations' networks, as well as via sites that share cracked versions of commercial software. (more)

Posted on 22 January 2019 4:20 pm


USN-3863-2: APT vulnerability

22 January 2019 apt vulnerability. A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 12.04 ESM Summary. An attacker could trick APT into installing altered packages. Software Description apt - Advanced front-end for dpkg Details. USN-3863-1 fixed a vulnerability in APT. (more)

Posted on 22 January 2019 4:17 pm


Adware Installers Disguised as Cracks Installing STOP Ransomware

Adware Installers Disguised as Cracks Installing STOP Ransomware. STOP ransomware is using adware installers disguised as cracks as a new method of distributing itself to unsuspecting users. According to Bleeping Computer creator and owner Lawrence Abrams, websites known for distributing software.... (more)

Posted on 22 January 2019 3:26 pm


DNC targeted by Russian hackers beyond 2018 midterms, it claims

The Democratic National Committee (DNC) has filed a civil complaint accusing Russia of trying to hack its computers as recently as November 2018. In its court filing , the DNC argues that not only did the campaign and several Trump operatives collude with Russia to steal electronic information, but.... (more)

Posted on 22 January 2019 2:21 pm


Good reason to fear China’s 5G technology, says Daim

Council of Eminent Persons (CEP) chairman Daim Zainuddin says China’s technological prowess and economic dominance had led the US to accuse Beijing of intellectual property theft. KUALA LUMPUR: Malaysia has good reason to fear the exponential rise of China’s 5G technology as it could pose a threat.... (more)

Posted on 22 January 2019 1:52 pm


Ransomware Attacks May Soon Require Disclosure in North Carolina

North Carolina’s Attorney General Josh Stein and Rep. Jason Saine proposed legislation designed to strengthen the state's identity theft protection law, targeting prevention and consumer protection boost in the face of breaches. The most significant future enhancement to the breach prevention.... (more)

Posted on 22 January 2019 1:48 pm


SecurityFocus Vulnerabilities: Vuln: Microsoft Internet Explorer CVE-2018-8373 Remote Memory Corruption Vulnerability

» SecurityFocus Vulnerabilities » Vuln: Microsoft Internet Explorer CVE-2018-8373 Remote Memory Corruption Vulnerability .... (more)

Posted on 22 January 2019 1:26 pm


Safaricom introduces I.T security solutions for enterprise customers - CIO East Africa

Safaricom enterprise customers can now access a wide range of security solutions to protect their information technology (I.T) systems. The services include Managed Security Solutions, Security Assurance and Advisory services as well as Managed Security Operations Center solutions. (more)

Posted on 22 January 2019 1:16 pm


The API Security Essentials You Need to Know

In the modern enterprise, APIs are both the keys that unlockdata and the glue that makes system integration possible. But how steep are the associated security concerns APIs create? As it turns out, they are quite high. As associate Ericka Chickowski covered in her post, Qualys Security Conference,.... (more)

Posted on 22 January 2019 12:48 pm


France Hits Google with $57 Million GDPR Fine

Photo: Google. France on Monday imposed a €50 million ($57 million) fine against Google for violations of the EU General Data Protection Regulation , sending a strong to message to the technology giant that its privacy and data collection practices are not adequate. (more)

Posted on 22 January 2019 11:40 am


Business resilience should be a core company strategy, so why are businesses struggling to take action?

A recent survey showed that only 51% of U.S. business decision makers say their organization is definitely as resilient as it needs to be against disruptions such as cyber threats. In addition, the survey showed that 96% of U.S. business decision makers claim business resilience should be a core company strategy. (more)

Posted on 22 January 2019 9:04 am


IoT roundup: Security problems galore and a way to track urinary infections

The two things everybody knows about IoT are that A, its use is growing at a pretty spectacular rate, encompassing use cases from the most frivolous of consumer gadgetry to the most heavy-duty of industrial machinery, and B, it is, as a consequence, a gloriously tempting target for malicious hackers. (more)

Posted on 22 January 2019 3:25 am


Plexal bolsters global cybersecurity hub with two international partnerships - New Electronics

Innovation centre Plexal, which delivers LORCA, the government-backed cybersecurity programme, has announced new partnerships with the Global Cyber Alliance, City of New York, and the New York Economic Development Corporation. These partnerships have been designed to help cybersecurity companies.... (more)

Posted on 22 January 2019 2:49 am


New Phobos Ransomware Exploits Weak Security To Hit Targets Around the World

An anonymous reader quotes a report from ZDNet: A prolific cybercrime gang behind a series of ransomware attacks is distributing a new form of the file-encrypting malware which combines two well known and successful variants in a series of attacks against businesses around the world. (more)

Posted on 22 January 2019 2:49 am


We'll Likely See a Rise in Internet Blackouts in 2019

We'll likely see a rise in internet blackouts in 2019, for two reasons: countries deliberately "turning off" the internet within their borders, and hackers disrupting segments of the internet with distributed denial-of-service (DDoS) attacks. Above all, both will force policymakers everywhere to reckon with the fact that the internet itself is . (more)

Posted on 21 January 2019 11:42 pm


France considers bill amendment to target Huawei: Les Echos

PARIS (Reuters) - France is considering introducing a bill amendment to empower its security and defence watchdogs to make retroactive checks to telecoms operators’ equipment once installed, targeting China’s Huawei, Les Echos newspaper reported on Monday without citing sources. (more)

Posted on 21 January 2019 11:26 pm


Cumbria health trust hit by 147 cyber attacks in five years

. Posted on Author Cyber Security Review The NHS in Cumbria has been hit by more than 150 cyber attacks in five years, the BBC can reveal. Of these, 147 were directed at University Hospitals of Morecambe Bay NHS Trust (UHMBT), which runs hospitals in Barrow, Kendal, Morecambe and Lancaster. (more)

Posted on 21 January 2019 8:11 pm


Bug in widespread Wi-Fi chipset firmware can lead to zero-click code execution

A vulnerability in the firmware of a Wi-Fi chipset that is widely used in laptops, streaming, gaming and a variety of “smart” devices can be exploited to compromise them without user interaction. The research and the discovered flaws. The discovery was made by Embedi researcher Denis Selianin, who.... (more)

Posted on 21 January 2019 4:54 pm


WPML Plugin Hacked, Thousands Of Users Spammed

WPML Plugin was reportedly hacked by a former employee, who also sent out spam emails to its users regarding the site’s security. WPML allows multilingual websites to work smoothly under WordPress. WPML -- the plugin which supports multilingual websites in WordPress was hacked yesterday, said sources. (more)

Posted on 21 January 2019 4:27 pm


What is spear phishing? Why targeted email attacks are so difficult to stop

Phishing versus spear phishing. While regular phishing campaigns go after large numbers of relatively low-yield targets, spear phishing aims at specific targets using specially emails crafted to their intended victim. “Phishing is just kind of generic, low-tech, not targeted attacks,” says Aaron.... (more)

Posted on 21 January 2019 1:49 pm


Newcastle school targeted in fees phishing scam

Image copyright Google Image caption Royal Grammar School in Newcastle was one of a number of schools targeted in the cyber attack. Fee-paying schools were targeted in a cyber attack which accessed parents' email addresses, it has emerged. Fraudulent emails sent from school accounts offered a 25%.... (more)

Posted on 21 January 2019 1:09 pm


Arrested Portuguese hacker is Football Leaks 'whistleblower' - lawyers

By Catarina Demony and Goncalo Almeida. LISBON (Reuters) - A Portuguese man arrested in Hungary on suspicion of extortion and secrecy violations hacked football bodies' documents - which later appeared on the Football Leaks website - because he was "outraged" by criminality in the sport, his lawyers said. (more)

Posted on 21 January 2019 11:30 am


Omron CX-Supervisor

Advisory Document (more)

Posted on 17 January 2019 5:10 pm


ABB CP400 Panel Builder TextEditor 2.0

Advisory Document (more)

Posted on 17 January 2019 5:05 pm


ControlByWeb X-320M

Advisory Document (more)

Posted on 17 January 2019 5:00 pm


LCDS - Leão Consultoria e Desenvolvimento de Sistemas Ltda ME LAquis SCADA

Advisory Document (more)

Posted on 15 January 2019 5:23 pm


Emerson DeltaV

Advisory Document (more)

Posted on 10 January 2019 5:15 pm


Omron CX-One CX-Protocol

Advisory Document (more)

Posted on 10 January 2019 5:10 pm


Pilz PNOZmulti Configurator

Advisory Document (more)

Posted on 10 January 2019 5:05 pm


Tridium Niagara Enterprise Security, Niagara AX, and Niagara 4

Advisory Document (more)

Posted on 10 January 2019 5:00 pm


Schneider Electric Zelio Soft 2

Advisory Document (more)

Posted on 8 January 2019 5:05 pm


Schneider Electric IIoT Monitor (Update A)

Advisory Document (more)

Posted on 8 January 2019 5:00 pm


Schneider Electric Pro-face GP-Pro EX

Advisory Document (more)

Posted on 3 January 2019 5:10 pm


Yokogawa Vnet/IP Open Communication Driver

Advisory Document (more)

Posted on 3 January 2019 5:05 pm


Hetronic Nova-M

Advisory Document (more)

Posted on 3 January 2019 5:00 pm


Horner Automation Cscape

Advisory Document (more)

Posted on 20 December 2018 5:10 pm


Schneider Electric EcoStruxure

Advisory Document (more)

Posted on 20 December 2018 5:05 pm


Rockwell Automation FactoryTalk Services Platform

Advisory Document (more)

Posted on 20 December 2018 5:00 pm


ABB GATE-E2

Advisory Document (more)

Posted on 18 December 2018 5:30 pm


Advantech WebAccess/SCADA

Advisory Document (more)

Posted on 18 December 2018 5:25 pm


AA18-337A: SamSam Ransomware

Original release date: December 03, 2018 Summary The Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) and the Federal Bureau of Investigation (FBI) are issuing this activity alert to inform computer network defenders about SamSam ransomware, also known as MSIL/Samas.A. Specifically, this product shares analysis of vulnerabilities that cyber actors exploited to deploy this ransomware. In addition, this report provides recommendations for prevention and mitigation. The SamSam actors targeted multiple industries, including some within critical infrastructure. Victims were located predominately in the United States, but also internationally. Network-wide infections against organizations are far more likely to garner large ransom payments than infections of individual systems. Organizations that provide essential functions have a critical need to resume operations quickly and are more likely to pay larger ransoms. The actors exploit Windows servers to gain persistent access to a victim’s network and infect all reachable hosts. According to reporting from victims in early 2016, cyber actors used the JexBoss Exploit Kit to access vulnerable JBoss applications. Since mid-2016, FBI analysis of victims’ machines indicates that cyber actors use Remote Desktop Protocol (RDP) to gain persistent access to victims’ networks. Typically, actors either use brute force attacks or stolen login credentials. Detecting RDP intrusions can be challenging because the malware enters through an approved access point. After gaining access to a particular network, the SamSam actors escalate privileges for administrator rights, drop malware onto the server, and run an executable file, all without victims’ action or authorization. While many ransomware campaigns rely on a victim completing an action, such as opening an email or visiting a compromised website, RDP allows cyber actors to infect victims with minimal detection. Analysis of tools found on victims’ networks indicated that successful cyber actors purchased several of the stolen RDP credentials from known darknet marketplaces. FBI analysis of victims’ access logs revealed that the SamSam actors can infect a network within hours of purchasing the credentials. While remediating infected systems, several victims found suspicious activity on their networks unrelated to SamSam. This activity is a possible indicator that the victims’ credentials were stolen, sold on the darknet, and used for other illegal activity. SamSam actors leave ransom notes on encrypted computers. These instructions direct victims to establish contact through a Tor hidden service site. After paying the ransom in Bitcoin and establishing contact, victims usually receive links to download cryptographic keys and tools to decrypt their network. Technical Details NCCIC recommends organizations review the following SamSam Malware Analysis Reports. The reports represent four SamSam malware variants. This is not an exhaustive list. MAR-10219351.r1.v2 – SamSam1 MAR-10166283.r1.v1 – SamSam2 MAR-10158513.r1.v1 – SamSam3 MAR-10164494.r1.v1 – SamSam4 For general information on ransomware, see the NCCIC Security Publication at https://www.us-cert.gov/security-publications/Ransomware . Mitigations DHS and FBI recommend that users and administrators consider using the following best practices to strengthen the security posture of their organization's systems. System owners and administrators should review any configuration changes before implementation to avoid unwanted impacts. Audit your network for systems that use RDP for remote communication. Disable the service if unneeded or install available patches. Users may need to work with their technology venders to confirm that patches will not affect system processes. Verify that all cloud-based virtual machine instances with public IPs have no open RDP ports, especially port 3389, unless there is a valid business reason to keep open RDP ports. Place any system with an open RDP port behind a firewall and require users to use a virtual private network (VPN) to access that system. Enable strong passwords and account lockout policies to defend against brute force attacks. Where possible, apply two-factor authentication. Regularly apply system and software updates. Maintain a good back-up strategy. Enable logging and ensure that logging mechanisms capture RDP logins. Keep logs for a minimum of 90 days and review them regularly to detect intrusion attempts. When creating cloud-based virtual machines, adhere to the cloud provider’s best practices for remote access. Ensure that third parties that require RDP access follow internal policies on remote access. Minimize network exposure for all control system devices. Where possible, disable RDP on critical devices. Regulate and limit external-to-internal RDP connections. When external access to internal resources is required, use secure methods such as VPNs. Of course, VPNs are only as secure as the connected devices. Restrict users' ability (permissions) to install and run unwanted software applications. Scan for and remove suspicious email attachments; ensure the scanned attachment is its "true file type" (i.e., the extension matches the file header). Disable file and printer sharing services. If these services are required, use strong passwords or Active Directory authentication. Additional information on malware incident prevention and handling can be found in Special Publication 800-83, Guide to Malware Incident Prevention and Handling for Desktops and Laptops , from the National Institute of Standards and Technology. [1] Contact Information To report an intrusion and request resources for incident response or technical assistance, contact NCCIC, FBI, or the FBI’s Cyber Division via the following information: NCCIC NCCICCustomerService@hq.dhs.gov 888-282-0870 FBI’s Cyber Division CyWatch@fbi.gov 855-292-3937 FBI through a local field office Feedback DHS strives to make this report a valuable tool for our partners and welcomes feedback on how this publication could be improved. You can help by answering a few short questions about this report at the following URL: https://www.us-cert.gov/forms/feedback . References [1] NIST SP 800-83: Guide to Malware Incident Prevention and Handling for Desktops and Laptops Revisions December 3, 2018: Initial version This product is provided subject to this Notification and this Privacy & Use policy. (more)

Posted on 3 December 2018 6:18 pm


TA18-331A: 3ve – Major Online Ad Fraud Operation

Original release date: November 27, 2018 Systems Affected Microsoft Windows Overview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). DHS and FBI are releasing this TA to provide information about a major online ad fraud operation—referred to by the U.S. Government as "3ve"—involving the control of over 1.7 million unique Internet Protocol (IP) addresses globally, when sampled over a 10-day window. Description Online advertisers desire premium websites on which to publish their ads and large numbers of visitors to view those ads. 3ve created fake versions of both (websites and visitors), and funneled the advertising revenue to cyber criminals. 3ve obtained control over 1.7 million unique IPs by leveraging victim computers infected with Boaxxe/Miuref and Kovter malware, as well as Border Gateway Protocol-hijacked IP addresses.  Boaxxe/Miuref Malware Boaxxe malware is spread through email attachments and drive-by downloads. The ad fraud scheme that utilizes the Boaxxe botnet is primarily located in a data center. Hundreds of machines in this data center are browsing to counterfeit websites. When these counterfeit webpages are loaded into a browser, requests are made for ads to be placed on these pages. The machines in the data center use the Boaxxe botnet as a proxy to make requests for these ads. A command and control (C2) server sends instructions to the infected botnet computers to make the ad requests in an effort to hide their true data center IPs. Kovter Malware Kovter malware is also spread through email attachments and drive-by downloads. The ad fraud scheme that utilizes the Kovter botnet runs a hidden Chromium Embedded Framework (CEF) browser on the infected machine that the user cannot see. A C2 server tells the infected machine to visit counterfeit websites. When the counterfeit webpage is loaded in the hidden browser, requests are made for ads to be placed on these counterfeit pages. The infected machine receives the ads and loads them into the hidden browser. Impact For the indicators of compromise (IOCs) below, keep in mind that any one indicator on its own may not necessarily mean that a machine is infected. Some IOCs may be present for legitimate applications and network traffic as well, but are included here for completeness. Boaxxe/Miuref Malware Boaxxe malware leaves several executables on the infected machine. They may be found in one or more of the following locations: %UserProfile%\AppData\Local\VirtualStore\lsass.aaa %UserProfile%\AppData\Local\Temp\<RANDOM>.exe %UserProfile%\AppData\Local\<Random eight-character folder name>\<original file name>.exe The HKEY_CURRENT_USER (HKCU) “Run” key is set to the path to one of the executables created above. HKCU\Software\Microsoft\Windows\CurrentVersion\Run\<Above path to executable>\ Kovter Malware Kovter malware is found mostly in the registry, but the following files may be found on the infected machine: %UserProfile\AppData\Local\Temp\<RANDOM> .exe/.bat %UserProfile%\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\<RANDOM>\<RANDOM FILENAME>.exe %UserProfile%\AppData\Local\<RANDOM>\<RANDOM>.lnk %UserProfile%\AppData\Local\<RANDOM>\<RANDOM>.bat Kovter is known to hide in the registry under: HKCU\SOFTWARE\<RANDOM>\<RANDOM> The customized CEF browser is dropped to: %UserProfile%\AppData\Local\<RANDOM> The keys will look like random values and contain scripts. In some values, a User-Agent string can be clearly identified. An additional key containing a link to a batch script on the hard drive may be placed within registry key: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run There are several patterns in the network requests that are made by Kovter malware when visiting the counterfeit websites. The following are regex rules for these URL patterns: /?ptrackp=\d{5,8} /feedrs\d/click?feed_id=\d{1,5}&sub_id=\d{1,5}&cid=[a-f0-9-]*&spoof_domain=[\w\.\d-_]*&land_ip=\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3} /feedrs\d/vast_track?a=impression&feed_id=\d{5}&sub_id=\d{1,5}&sub2_id=\d{1,5}&cid=[a-f\d-] The following is a YARA rule for detecting Kovter: rule KovterUnpacked {   meta:     desc = "Encoded strings in unpacked Kovter samples."   strings:     $ = "7562@3B45E129B93"     $ = "@ouhKndCny"     $ = "@ouh@mmEdctffdsr"     $ = "@ouhSGQ"   condition:     all of them } Solution If you believe you may be a victim of 3ve and its associated malware or hijacked IPs, and have information that may be useful to investigators, submit your complaint to www.ic3.gov and use the hashtag 3ve (#3ve) in the body of your complaint. DHS and FBI advise users to take the following actions to remediate malware infections associated with Boaxxe/Miuref or Kovter: Use and maintain antivirus software. Antivirus software recognizes and protects your computer against most known viruses. Security companies are continuously updating their software to counter these advanced threats. Therefore, it is important to keep your antivirus software up-to-date. If you suspect you may be a victim of malware, update your antivirus software definitions and run a full-system scan. (See Understanding Anti-Virus Software for more information.) Avoid clicking links in email. Attackers have become very skilled at making phishing emails look legitimate. Users should ensure the link is legitimate by typing the link into a new browser. (See Avoiding Social Engineering and Phishing Attacks .) Change your passwords. Your original passwords may have been compromised during the infection, so you should change them. (See Choosing and Protecting Passwords .) Keep your operating system and application software up-to-date. Install software patches so that attackers cannot take advantage of known problems or vulnerabilities. You should enable automatic updates of the operating system if this option is available. (See Understanding Patches and Software Updates  for more information.) Use anti-malware tools. Using a legitimate program that identifies and removes malware can help eliminate an infection... (more)

Posted on 27 November 2018 7:09 pm


AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide

Original release date: October 11, 2018 Summary This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States. [1] [2] [3] [4] [5] In it we highlight the use of five publicly available tools, which have been used for malicious purposes in recent cyber incidents around the world. The five tools are: Remote Access Trojan: JBiFrost Webshell: China Chopper Credential Stealer: Mimikatz Lateral Movement Framework: PowerShell Empire C2 Obfuscation and Exfiltration: HUC Packet Transmitter To aid the work of network defenders and systems administrators, we also provide advice on limiting the effectiveness of these tools and detecting their use on a network. The individual tools we cover in this report are limited examples of the types of tools used by threat actors. You should not consider this an exhaustive list when planning your network defense. Tools and techniques for exploiting networks and the data they hold are by no means the preserve of nation states or criminals on the dark web. Today, malicious tools with a variety of functions are widely and freely available for use by everyone from skilled penetration testers, hostile state actors and organized criminals, to amateur cyber criminals. The tools in this Activity Alert have been used to compromise information across a wide range of critical sectors, including health, finance, government, and defense. Their widespread availability presents a challenge for network defense and threat-actor attribution. Experience from all our countries makes it clear that, while cyber threat actors continue to develop their capabilities, they still make use of established tools and techniques. Even the most sophisticated threat actor groups use common, publicly available tools to achieve their objectives. Whatever these objectives may be, initial compromises of victim systems are often established through exploitation of common security weaknesses. Abuse of unpatched software vulnerabilities or poorly configured systems are common ways for a threat actor to gain access. The tools detailed in this Activity Alert come into play once a compromise has been achieved, enabling attackers to further their objectives within the victim’s systems. How to Use This Report The tools detailed in this Activity Alert fall into five categories: Remote Access Trojans (RATs), webshells, credential stealers, lateral movement frameworks, and command and control (C2) obfuscators. This Activity Alert provides an overview of the threat posed by each tool, along with insight into where and when it has been deployed by threat actors. Measures to aid detection and limit the effectiveness of each tool are also described. The Activity Alert concludes with general advice for improving network defense practices. Technical Details Remote Access Trojan: JBiFrost   First observed in May 2015, the JBiFrost RAT is a variant of the Adwind RAT, with roots stretching back to the Frutas RAT from 2012. A RAT is a program that, once installed on a victim’s machine, allows remote administrative control. In a malicious context, it can—among many other functions—be used to install backdoors and key loggers, take screen shots, and exfiltrate data. Malicious RATs can be difficult to detect because they are normally designed not to appear in lists of running programs and can mimic the behavior of legitimate applications. To prevent forensic analysis, RATs have been known to disable security measures (e.g., Task Manager) and network analysis tools (e.g., Wireshark) on the victim’s system. In Use JBiFrost RAT is typically employed by cyber criminals and low-skilled threat actors, but its capabilities could easily be adapted for use by state-sponsored threat actors. Other RATs are widely used by Advanced Persistent Threat (APT) actor groups, such as Adwind RAT, against the aerospace and defense sector; or Quasar RAT, by APT10, against a broad range of sectors. Threat actors have repeatedly compromised servers in our countries with the purpose of delivering malicious RATs to victims, either to gain remote access for further exploitation, or to steal valuable information such as banking credentials, intellectual property, or PII. Capabilities JBiFrost RAT is Java-based, cross-platform, and multifunctional. It poses a threat to several different operating systems, including Windows, Linux, MAC OS X, and Android. JBiFrost RAT allows threat actors to pivot and move laterally across a network or install additional malicious software. It is primarily delivered through emails as an attachment, usually an invoice notice, request for quotation, remittance notice, shipment notification, payment notice, or with a link to a file hosting service. Past infections have exfiltrated intellectual property, banking credentials, and personally identifiable information (PII). Machines infected with JBiFrost RAT can also be used in botnets to carry out distributed denial-of-service attacks. Examples Since early 2018, we have observed an increase in JBiFrost RAT being used in targeted attacks against critical national infrastructure owners and their supply chain operators. There has also been an increase in the RAT’s hosting on infrastructure located in our countries. In early 2017, Adwind RAT was deployed via spoofed emails designed to look as if they originated from Society for Worldwide Interbank Financial Telecommunication, or SWIFT, network services. Many other publicly available RATs, including variations of Gh0st RAT, have also been observed in use against a range of victims worldwide. Detection and Protection Some possible indications of a JBiFrost RAT infection can include, but are not limited to: Inability to restart the computer in safe mode, Inability to open the Windows Registry Editor or Task Manager, Significant increase in disk activity and/or network traffic, Connection attempts to known malicious Internet Protocol (IP) addresses, and Creation of new files and directories with obfuscated or random names. Protection is best afforded by ensuring systems and installed applications are all fully patched and updated. The use of a modern antivirus program with automatic definition updates and regular system scans will also help ensure that most of the latest variants are stopped in their tracks. You should ensure that your organization is able to collect antivirus detections centrally across its estate and investigate RAT detections efficiently. Strict application whitelisting is recommended to prevent infections from occurring. The initial infection mechanism for RATs, including JBiFrost RAT, can be via phishing emails... (more)

Posted on 11 October 2018 6:19 pm


TA18-276B: Advanced Persistent Threat Activity Exploiting Managed Service Providers

Original release date: October 03, 2018 Systems Affected Network Systems Overview The National Cybersecurity and Communications Integration Center (NCCIC) is aware of ongoing APT actor activity attempting to infiltrate the networks of global managed service providers (MSPs). Since May 2016, APT actors have used various tactics, techniques, and procedures (TTPs) for the purposes of cyber espionage and intellectual property theft. APT actors have targeted victims in several U.S. critical infrastructure sectors, including Information Technology (IT), Energy, Healthcare and Public Health, Communications, and Critical Manufacturing. This Technical Alert (TA) provides information and guidance to assist MSP customer network and system administrators with the detection of malicious activity on their networks and systems and the mitigation of associated risks. This TA includes an overview of TTPs used by APT actors in MSP network environments, recommended mitigation techniques, and information on reporting incidents. Description MSPs provide remote management of customer IT and end-user systems. The number of organizations using MSPs has grown significantly over recent years because MSPs allow their customers to scale and support their network environments at a lower cost than financing these resources internally. MSPs generally have direct and unfettered access to their customers’ networks, and may store customer data on their own internal infrastructure. By servicing a large number of customers, MSPs can achieve significant economies of scale. However, a compromise in one part of an MSP’s network can spread globally, affecting other customers and introducing risk. Using an MSP significantly increases an organization’s virtual enterprise infrastructure footprint and its number of privileged accounts, creating a larger attack surface for cyber criminals and nation-state actors. By using compromised legitimate MSP credentials (e.g., administration, domain, user), APT actors can move bidirectionally between an MSP and its customers’ shared networks. Bidirectional movement between networks allows APT actors to easily obfuscate detection measures and maintain a presence on victims’ networks. Note: NCCIC previously released information related to this activity in Alert TA17-117A: Intrusions Affecting Multiple Victims Across Multiple Sectors published on April 27, 2017, which includes indicators of compromise, signatures, suggested detection methods, and recommended mitigation techniques. Technical Details APT APT actors use a range of “living off the land” techniques to maintain anonymity while conducting their attacks. These techniques include using legitimate credentials and trusted off-the-shelf applications and pre-installed system tools present in MSP customer networks. Pre-installed system tools, such as command line scripts, are very common and used by system administrators for legitimate processes. Command line scripts are used to discover accounts and remote systems. PowerSploit is a repository of Microsoft PowerShell and Visual Basic scripts and uses system commands such as netsh . PowerSploit, originally developed as a legitimate penetration testing tool, is widely misused by APT actors. These scripts often cannot be blocked because they are legitimate tools, so APT actors can use them and remain undetected on victim networks. Although network defenders can generate log files, APT actors’ use of legitimate scripts makes it difficult to identify system anomalies and other malicious activity. When APT actors use system tools and common cloud services, it can also be difficult for network defenders to detect data exfiltration. APT actors have been observed using Robocopy—a Microsoft command line tool—to transfer exfiltrated and archived data from MSP client networks back through MSP network environments. Additionally, APT actors have been observed using legitimate PuTTY Secure Copy Client functions, allowing them to transfer stolen data securely and directly to third-party systems. Impact A successful network intrusion can have severe impacts to the affected organization, particularly if the compromise becomes public. Possible impacts include Temporary or permanent loss of sensitive or proprietary information, Disruption to regular operations, Financial losses to restore systems and files, and Potential harm to the organization’s reputation. Solution Detection Organizations should configure system logs to detect incidents and to identify the type and scope of malicious activity. Properly configured logs enable rapid containment and appropriate response. Response An organization’s ability to rapidly respond to and recover from an incident begins with the development of an incident response capability. An organization’s response capability should focus on being prepared to handle the most common attack vectors (e.g., spearphishing, malicious web content, credential theft). In general, organizations should prepare by Establishing and periodically updating an incident response plan. Establishing written guidelines that prioritize incidents based on mission impact, so that an appropriate response can be initiated. Developing procedures and out-of-band lines of communication to handle incident reporting for internal and external relationships. Exercising incident response measures for various intrusion scenarios regularly, as part of a training regime. Committing to an effort that secures the endpoint and network infrastructure: prevention is less costly and more effective than reacting after an incident. Mitigation Manage Supply Chain Risk MSP clients that do not conduct the majority of their own network defense should work with their MSP to determine what they can expect in terms of security. MSP clients should understand the supply chain risk associated with their MSP. Organizations should manage risk equally across their security, legal, and procurement groups. MSP clients should also refer to cloud security guidance from the National Institute of Standards and Technology to learn about MSP terms of service, architecture, security controls, and risks associated with cloud computing and data protection. [1] [2] [3] Architecture Restricting access to networks and systems is critical to containing an APT actor’s movement. Provided below are key items that organizations should implement and periodically audit to ensure their network environment’s physical and logical architecture limits an APT actor’s visibility and access. Virtual Private Network Connection Recommendations Use a dedicated Virtual Private Network (VPN) for MSP connection... (more)

Posted on 3 October 2018 2:47 pm


TA18-276A: Using Rigorous Credential Control to Mitigate Trusted Network Exploitation

Original release date: October 03, 2018 Systems Affected Network Systems Overview This technical alert addresses the exploitation of trusted network relationships and the subsequent illicit use of legitimate credentials by Advanced Persistent Threat (APT) actors. It identifies APT actors' tactics, techniques, and procedures (TTPs) and describes the best practices that could be employed to mitigate each of them. The mitigations for each TTP are arranged according to the National Institute of Standards and Technology (NIST) Cybersecurity Framework core functions of Protect, Detect, Respond, and Recover. Description APT actors are using multiple mechanisms to acquire legitimate user credentials to exploit trusted network relationships in order to expand unauthorized access, maintain persistence, and exfiltrate data from targeted organizations. Suggested best practices for administrators to mitigate this threat include auditing credentials, remote-access logs, and controlling privileged access and remote access. Impact APT actors are conducting malicious activity against organizations that have trusted network relationships with potential targets, such as a parent company, a connected partner, or a contracted managed service provider (MSP). APT actors can use legitimate credentials to expand unauthorized access, maintain persistence, exfiltrate data, and conduct other operations, while appearing to be authorized users. Leveraging legitimate credentials to exploit trusted network relationships also allows APT actors to access other devices and other trusted networks, which affords intrusions a high level of persistence and stealth. Solution Recommended best practices for mitigating this threat include rigorous credential and privileged-access management, as well as remote-access control, and audits of legitimate remote-access logs. While these measures aim to prevent the initial attack vectors and the spread of malicious activity, there is no single proven threat response. Using a defense-in-depth strategy is likely to increase the odds of successfully disrupting adversarial objectives long enough to allow network defenders to detect and respond before the successful completion of a threat actor’s objectives. Any organization that uses an MSP to provide services should monitor the MSP's interactions within their organization’s enterprise networks, such as account use, privileges, and access to confidential or proprietary information. Organizations should also ensure that they have the ability to review their security and monitor their information hosted on MSP networks. APT TTPs and Corresponding Mitigations The following table displays the TTPs employed by APT actors and pairs them with mitigations that network defenders can implement. Table 1: APT TTPs and Mitigations APT TTPs Mitigations Preparation Allocate operational infrastructure, such as Internet Protocol addresses (IPs). Gather target credentials to use for legitimate access. Protect: Educate users to never click unsolicited links or open unsolicited attachments in emails. Implement an awareness and training program. Detect: Leverage multi-sourced threat-reputation services for files, Domain Name System (DNS), Uniform Resource Locators (URLs), IPs, and email addresses. Engagement Use legitimate remote access, such as virtual private networks (VPNs) and Remote Desktop Protocol (RDP). Leverage a trusted relationship between networks. Protect: Enable strong spam filters to prevent phishing emails from reaching end users. Authenticate inbound email using Sender Policy Framework; Domain-Based Message Authentication, Reporting and Conformance; and DomainKeys Identified Mail to prevent email spoofing. Prevent external access via RDP sessions and require VPN access. Enforce multi-factor authentication and account-lockout policies to defend against brute force attacks. Detect: Leverage multi-sourced threat-reputation services for files, DNS, URLs, IPs, and email addresses. Scan all incoming and outgoing emails to detect threats and filter out executables. Audit all remote authentications from trusted networks or service providers for anomalous activity. Respond and Recover: Reset credentials, including system accounts. Transition to multifactor authentication and reduce use of password-based systems, which are susceptible to credential theft, forgery, and reuse across multiple systems. Presence Execution and Internal Reconnaissance: Write to disk and execute malware and tools on hosts. Use interpreted scripts and run commands in shell to enumerate accounts, local network, operating system, software, and processes for internal reconnaissance. Map accessible networks and scan connected targets. Lateral Movement: Use remote services and log on remotely. Use legitimate credentials to move laterally onto hosts, domain controllers, and servers. Write to remote file shares, such as Windows administrative shares. Credential Access: Locate credentials, dump credentials, and crack passwords. Protect: Deploy an anti-malware solution, which also aims to prevent spyware and adware. Prevent the execution of unauthorized software, such as Mimikatz, by using application whitelisting. Deploy PowerShell mitigations and, in the more current versions of PowerShell, enable monitoring and security features. Prevent unauthorized external access via RDP sessions. Restrict workstations from communicating directly with other workstations. Separate administrative privileges between internal administrator accounts and accounts used by trusted service providers. Enable detailed session-auditing and session-logging. Detect: Audit all remote authentications from trusted networks or service providers. Detect mismatches by correlating credentials used within internal networks with those employed on external-facing systems. Log use of system administrator commands, such as net, ipconfig, and ping. Audit logs for suspicious behavior. Use whitelist or baseline comparison to monitor Windows event logs and network traffic to detect when a user maps a privileged administrative share on a Windows system. Leverage multi-sourced threat-reputation services for files, DNS, URLs, IPs, and email addresses. Respond and Recover: Reset credentials. Monitor accounts associated with a compromise for abnormal behaviors, including unusual connections to nonstandard resources or attempts to elevate privileges, enumerate, or execute unexpected programs or applications... (more)

Posted on 3 October 2018 2:00 pm


TA18-275A: HIDDEN COBRA – FASTCash Campaign

Original release date: October 02, 2018 | Last revised: December 21, 2018 Systems Affected Retail Payment Systems Overview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS), the Department of the Treasury (Treasury), and the Federal Bureau of Investigation (FBI). Working with U.S. government partners, DHS, Treasury, and FBI identified malware and other indicators of compromise (IOCs) used by the North Korean government in an Automated Teller Machine (ATM) cash-out scheme—referred to by the U.S. Government as “FASTCash.” The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA. For more information on HIDDEN COBRA activity, visit https://www.us-cert.gov/hiddencobra . FBI has high confidence that HIDDEN COBRA actors are using the IOCs listed in this report to maintain a presence on victims’ networks to enable network exploitation. DHS, FBI, and Treasury are distributing these IOCs to enable network defense and reduce exposure to North Korean government malicious cyber activity. This TA also includes suggested response actions to the IOCs provided, recommended mitigation techniques, and information on reporting incidents. If users or administrators detect activity associated with the malware families associated with FASTCash, they should immediately flag it, report it to the DHS National Cybersecurity and Communications Integration Center (NCCIC) or the FBI Cyber Watch (CyWatch), and give it the highest priority for enhanced mitigation. NCCIC conducted analysis on 10 malware samples related to this activity and produced a Malware Analysis Report (MAR). MAR-10201537, HIDDEN COBRA FASTCash-Related Malware, examines the tactics, techniques, and procedures observed in the malware. Visit the MAR-10201537 page for the report and associated IOCs. Description Since at least late 2016, HIDDEN COBRA actors have used FASTCash tactics to target banks in Africa and Asia. At the time of this TA’s publication, the U.S. Government has not confirmed any FASTCash incidents affecting institutions within the United States. FASTCash schemes remotely compromise payment switch application servers within banks to facilitate fraudulent transactions. The U.S. Government assesses that HIDDEN COBRA actors will continue to use FASTCash tactics to target retail payment systems vulnerable to remote exploitation. According to a trusted partner’s estimation, HIDDEN COBRA actors have stolen tens of millions of dollars. In one incident in 2017, HIDDEN COBRA actors enabled cash to be simultaneously withdrawn from ATMs located in over 30 different countries. In another incident in 2018, HIDDEN COBRA actors enabled cash to be simultaneously withdrawn from ATMs in 23 different countries.   HIDDEN COBRA actors target the retail payment system infrastructure within banks to enable fraudulent ATM cash withdrawals across national borders. HIDDEN COBRA actors have configured and deployed malware on compromised switch application servers in order to intercept and reply to financial request messages with fraudulent but legitimate-looking affirmative response messages. Although the infection vector is unknown, all of the compromised switch application servers were running unsupported IBM Advanced Interactive eXecutive (AIX) operating system versions beyond the end of their service pack support dates; there is no evidence HIDDEN COBRA actors successfully exploited the AIX operating system in these incidents. HIDDEN COBRA actors exploited the targeted systems by using their knowledge of International Standards Organization (ISO) 8583—the standard for financial transaction messaging—and other tactics. HIDDEN COBRA actors most likely deployed ISO 8583 libraries on the targeted switch application servers. Malicious threat actors use these libraries to help interpret financial request messages and properly construct fraudulent financial response messages. Figure 1: Anatomy of a FASTCash scheme A review of log files showed HIDDEN COBRA actors making typos and actively correcting errors while configuring the targeted server for unauthorized activity. Based on analysis of the affected systems, analysts believe that malware—used by HIDDEN COBRA actors and explained in the Technical Details section below—inspected inbound financial request messages for specific primary account numbers (PANs). The malware generated fraudulent financial response messages only for the request messages that matched the expected PANs. Most accounts used to initiate the transactions had minimal account activity or zero balances. Analysts believe HIDDEN COBRA actors blocked transaction messages to stop denial messages from leaving the switch and used a GenerateResponse* function to approve the transactions. These response messages were likely sent for specific PANs matched using CheckPan() verification (see figure 1 for additional details on CheckPan() ). Technical Details HIDDEN COBRA actors used malicious Windows executable applications, command-line utility applications, and other files in the FASTCash campaign to perform transactions and interact with financial systems, including the switch application server. The initial infection vector used to compromise victim networks is unknown; however, analysts surmise HIDDEN COBRA actors used spear-phishing emails in targeted attacks against bank employees. HIDDEN COBRA actors likely used Windows-based malware to explore a bank’s network to identify the payment switch application server. Although these threat actors used different malware in each known incident, static analysis of malware samples indicates similarities in malware capabilities and functionalities. HIDDEN COBRA actors likely used legitimate credentials to move laterally through a bank’s network and to illicitly access the switch application server. This pattern suggests compromised systems within a bank’s network were used to access and compromise the targeted payment switch application server. Upon successful compromise of a bank’s payment switch application server, HIDDEN COBRA actors likely injected malicious code into legitimate processes—using command-line utility applications on the payment switch application server—to enable fraudulent behavior by the system in response to what would otherwise be normal payment switch application server activity. NCCIC collaborated with Symantec cybersecurity researchers to provide additional context on existing analysis [1] . Malware samples analyzed included malicious AIX executable files intended for a proprietary UNIX operating system developed by IBM. The AIX executable files were designed to inject malicious code into a currently running process... (more)

Posted on 2 October 2018 6:45 pm


TA18-201A: Emotet Malware

Original release date: July 20, 2018 Systems Affected Network Systems Overview Emotet is an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet continues to be among the most costly and destructive malware affecting state, local, tribal, and territorial (SLTT) governments, and the private and public sectors. This joint Technical Alert (TA) is the result of Multi-State Information Sharing & Analysis Center (MS-ISAC) analytic efforts, in coordination with the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC). Description Emotet continues to be among the most costly and destructive malware affecting SLTT governments. Its worm-like features result in rapidly spreading network-wide infection, which are difficult to combat. Emotet infections have cost SLTT governments up to $1 million per incident to remediate. Emotet is an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Additionally, Emotet is a polymorphic banking Trojan that can evade typical signature-based detection. It has several methods for maintaining persistence, including auto-start registry keys and services. It uses modular Dynamic Link Libraries (DLLs) to continuously evolve and update its capabilities. Furthermore, Emotet is Virtual Machine-aware and can generate false indicators if run in a virtual environment. Emotet is disseminated through malspam (emails containing malicious attachments or links) that uses branding familiar to the recipient; it has even been spread using the MS-ISAC name. As of July 2018, the most recent campaigns imitate PayPal receipts, shipping notifications, or “past-due” invoices purportedly from MS-ISAC. Initial infection occurs when a user opens or clicks the malicious download link, PDF, or macro-enabled Microsoft Word document included in the malspam. Once downloaded, Emotet establishes persistence and attempts to propagate the local networks through incorporated spreader modules. Figure 1: Malicious email distributing Emotet Currently, Emotet uses five known spreader modules: NetPass.exe, WebBrowserPassView, Mail PassView, Outlook scraper, and a credential enumerator. NetPass.exe is a legitimate utility developed by NirSoft that recovers all network passwords stored on a system for the current logged-on user. This tool can also recover passwords stored in the credentials file of external drives. Outlook scraper is a tool that scrapes names and email addresses from the victim’s Outlook accounts and uses that information to send out additional phishing emails from the compromised accounts. WebBrowserPassView is a password recovery tool that captures passwords stored by Internet Explorer, Mozilla Firefox, Google Chrome, Safari, and Opera and passes them to the credential enumerator module. Mail PassView is a password recovery tool that reveals passwords and account details for various email clients such as Microsoft Outlook, Windows Mail, Mozilla Thunderbird, Hotmail, Yahoo! Mail, and Gmail and passes them to the credential enumerator module. Credential enumerator is a self-extracting RAR file containing two components: a bypass component and a service component. The bypass component is used for the enumeration of network resources and either finds writable share drives using Server Message Block (SMB) or tries to brute force user accounts, including the administrator account. Once an available system is found, Emotet writes the service component on the system, which writes Emotet onto the disk. Emotet’s access to SMB can result in the infection of entire domains (servers and clients). Figure 2: Emotet infection process To maintain persistence, Emotet injects code into explorer.exe and other running processes. It can also collect sensitive information, including system name, location, and operating system version, and connects to a remote command and control server (C2), usually through a generated 16-letter domain name that ends in “.eu.” Once Emotet establishes a connection with the C2, it reports a new infection, receives configuration data, downloads and runs files, receives instructions, and uploads data to the C2 server. Emotet artifacts are typically found in arbitrary paths located off of the AppData\Local and AppData\Roaming directories. The artifacts usually mimic the names of known executables. Persistence is typically maintained through Scheduled Tasks or via registry keys. Additionally, Emotet creates randomly-named files in the system root directories that are run as Windows services. When executed, these services attempt to propagate the malware to adjacent systems via accessible administrative shares. Note: it is essential that privileged accounts are not used to log in to compromised systems during remediation as this may accelerate the spread of the malware. Example Filenames and Paths: C:\Users\<username>\AppData \Local\Microsoft\Windows\shedaudio.exe C:\Users\<username>\AppData\Roaming\Macromedia\Flash Player\macromedia\bin\flashplayer.exe Typical Registry Keys: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run System Root Directories: C:\Windows\11987416.exe C:\Windows\System32\46615275.exe C:\Windows\System32\shedaudio.exe C:\Windows\SysWOW64\f9jwqSbS.exe Impact Negative consequences of Emotet infection include temporary or permanent loss of sensitive or proprietary information, disruption to regular operations, financial losses incurred to restore systems and files, and potential harm to an organization’s reputation. Solution NCCIC and MS-ISAC recommend that organizations adhere to the following general best practices to limit the effect of Emotet and similar malspam: Use Group Policy Object to set a Windows Firewall rule to restrict inbound SMB communication between client systems. If using an alternative host-based intrusion prevention system (HIPS), consider implementing custom modifications for the control of client-to-client SMB communication. At a minimum, create a Group Policy Object that restricts inbound SMB connections to clients originating from clients. Use antivirus programs, with automatic updates of signatures and software, on clients and servers. Apply appropriate patches and updates immediately (after appropriate testing). Implement filters at the email gateway to filter out emails with known malspam indicators, such as known malicious subject lines, and block suspicious IP addresses at the firewall... (more)

Posted on 21 July 2018 12:24 am


TA18-149A: HIDDEN COBRA – Joanap Backdoor Trojan and Brambul Server Message Block Worm

Original release date: May 29, 2018 | Last revised: May 31, 2018 Systems Affected Network systems Overview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). Working with U.S. government partners, DHS and FBI identified Internet Protocol (IP) addresses and other indicators of compromise (IOCs) associated with two families of malware used by the North Korean government: a remote access tool (RAT), commonly known as Joanap; and a Server Message Block (SMB) worm, commonly known as Brambul. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA. For more information on HIDDEN COBRA activity, visit https://www.us-cert.gov/hiddencobra . FBI has high confidence that HIDDEN COBRA actors are using the IP addresses—listed in this report’s IOC files—to maintain a presence on victims’ networks and enable network exploitation. DHS and FBI are distributing these IP addresses and other IOCs to enable network defense and reduce exposure to any North Korean government malicious cyber activity. This alert also includes suggested response actions to the IOCs provided, recommended mitigation techniques, and information on how to report incidents. If users or administrators detect activity associated with these malware families, they should immediately flag it, report it to the DHS National Cybersecurity and Communications Integration Center (NCCIC) or the FBI Cyber Watch (CyWatch), and give it the highest priority for enhanced mitigation. See the following links for a downloadable copy of IOCs: IOCs (.csv) IOCs (.stix) NCCIC conducted analysis on four malware samples and produced a Malware Analysis Report (MAR). MAR-10135536.3 – RAT/Worm examines the tactics, techniques, and procedures observed in the malware. Visit MAR-10135536.3 – HIDDEN COBRA RAT/Worm for the report and associated IOCs. Description According to reporting of trusted third parties, HIDDEN COBRA actors have likely been using both Joanap and Brambul malware since at least 2009 to target multiple victims globally and in the United States—including the media, aerospace, financial, and critical infrastructure sectors. Users and administrators should review the information related to Joanap and Brambul from the Operation Blockbuster Destructive Malware Report [1] in conjunction with the IP addresses listed in the .csv and .stix files provided within this alert. Like many of the families of malware used by HIDDEN COBRA actors, Joanap, Brambul, and other previously reported custom malware tools, may be found on compromised network nodes. Each malware tool has different purposes and functionalities. Joanap malware is a fully functional RAT that is able to receive multiple commands, which can be issued by HIDDEN COBRA actors remotely from a command and control server. Joanap typically infects a system as a file dropped by other HIDDEN COBRA malware, which users unknowingly downloaded either when they visit sites compromised by HIDDEN COBRA actors, or when they open malicious email attachments. During analysis of the infrastructure used by Joanap malware, the U.S. Government identified 87 compromised network nodes. The countries in which the infected IP addresses are registered are as follows: Argentina Belgium Brazil Cambodia China Colombia Egypt India Iran Jordan Pakistan Saudi Arabia Spain Sri Lanka Sweden Taiwan Tunisia Malware often infects servers and systems without the knowledge of system users and owners. If the malware can establish persistence, it could move laterally through a victim’s network and any connected networks to infect nodes beyond those identified in this alert. Brambul malware is a brute-force authentication worm that spreads through SMB shares. SMBs enable shared access to files between users on a network. Brambul malware typically spreads by using a list of hard-coded login credentials to launch a brute-force password attack against an SMB protocol for access to a victim’s networks. Technical Details Joanap Joanap is a two-stage malware used to establish peer-to-peer communications and to manage botnets designed to enable other operations. Joanap malware provides HIDDEN COBRA actors with the ability to exfiltrate data, drop and run secondary payloads, and initialize proxy communications on a compromised Windows device. Other notable functions include file management, process management, creation and deletion of directories, and node management. Analysis indicates the malware encodes data using Rivest Cipher 4 encryption to protect its communication with HIDDEN COBRA actors. Once installed, the malware creates a log entry within the Windows System Directory in a file named mssscardprv.ax. HIDDEN COBRA actors use this file to capture and store victims’ information such as the host IP address, host name, and the current system time. Brambul Brambul malware is a malicious Windows 32-bit SMB worm that functions as a service dynamic link library file or a portable executable file often dropped and installed onto victims’ networks by dropper malware. When executed, the malware attempts to establish contact with victim systems and IP addresses on victims’ local subnets. If successful, the application attempts to gain unauthorized access via the SMB protocol (ports 139 and 445) by launching brute-force password attacks using a list of embedded passwords. Additionally, the malware generates random IP addresses for further attacks. Analysts suspect the malware targets insecure or unsecured user accounts and spreads through poorly secured network shares. Once the malware establishes unauthorized access on the victim’s systems, it communicates information about victim’s systems to HIDDEN COBRA actors using malicious email addresses. This information includes the IP address and host name—as well as the username and password—of each victim’s system. HIDDEN COBRA actors can use this information to remotely access a compromised system via the SMB protocol. Analysis of a newer variant of Brambul malware identified the following built-in functions for remote operations: harvesting system information, accepting command-line arguments, generating and executing a suicide script, propagating across the network using SMB, brute forcing SMB login credentials, and generating Simple Mail Transport Protocol email messages containing target host system information. Detection and Response This alert’s IOC files provide HIDDEN COBRA IOCs related to Joanap and Brambul... (more)

Posted on 29 May 2018 3:18 pm


TA18-145A: Cyber Actors Target Home and Office Routers and Networked Devices Worldwide

Original release date: May 25, 2018 | Last revised: June 07, 2018 Systems Affected Small office/home office (SOHO) routers Networked devices Network-attached storage (NAS) devices Overview Cybersecurity researchers have identified that foreign cyber actors have compromised hundreds of thousands of home and office routers and other networked devices worldwide [1]   [2] [3] . The actors used VPNFilter malware to target small office/home office (SOHO) routers. VPNFilter malware uses modular functionality to collect intelligence, exploit local area network (LAN) devices, and block actor-configurable network traffic. Specific characteristics of VPNFilter have only been observed in the BlackEnergy malware, specifically BlackEnergy versions 2 and 3. The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) recommend that owners of SOHO routers power cycle (reboot) SOHO routers and networked devices to temporarily disrupt the malware. DHS and FBI encourage SOHO router owners to report information concerning suspicious or criminal activity to their local FBI field office or the FBI’s 24/7 Cyber Watch (CyWatch). Field office contacts can be identified at www.fbi.gov/contact-us/field . CyWatch can be contacted by phone at 855-292-3937 or by email at CyWatch@fbi.gov. Each submitted report should include as much informaiton as possible, specifically the date, time, location, type of activity, number of people, the type of equipment used for the activity, the name of the submitting company or organization, and a designated point of contact. Description The size and scope of this infrastructure impacted by VPNFilter malware is significant. The persistent VPNFilter malware linked to this infrastructure targets a variety of SOHO routers and network-attached storage devices. The initial exploit vector for this malware is currently unknown. The malware uses a modular functionality on SOHO routers to collect intelligence, exploit LAN devices, and block actor-configurable network traffic. The malware can render a device inoperable, and has destructive functionality across routers, network-attached storage devices, and central processing unit (CPU) architectures running embedded Linux. The command and control mechanism implemented by the malware uses a combination of secure sockets layer (SSL) with client-side certificates for authentication and TOR protocols, complicating network traffic detection and analysis. Impact Negative consequences of VPNFilter malware infection include: temporary or permanent loss of sensitive or proprietary information, disruption to regular operations, financial losses incurred to restore systems and files, and potential harm to an organization’s reputation. Solution DHS and FBI recommend that all SOHO router owners power cycle (reboot) their devices to temporarily disrupt the malware. Network device management interfaces—such as Telnet, SSH, Winbox, and HTTP—should be turned off for wide-area network (WAN) interfaces, and, when enabled, secured with strong passwords and encryption. Network devices should be upgraded to the latest available versions of firmware, which often contain patches for vulnerabilities. Rebooting affected devices will cause non-persistent portions of the malware to be removed from the system. Network defenders should ensure that first-stage malware is removed from the devices, and appropriate network-level blocking is in place prior to rebooting affected devices. This will ensure that second stage malware is not downloaded again after reboot. While the paths at each stage of the malware can vary across device platforms, processes running with the name "vpnfilter" are almost certainly instances of the second stage malware. Terminating these processes and removing associated processes and persistent files that execute the second stage malware would likely remove this malware from targeted devices. References [1] New VPNFilter malware targets at least 500K networking devices worldwide [2] Justice Department Announces Actions to Disrupt Advanced Persistent Threat 28 Botnet of Infected Routers and Network Storage [3] VPNFilter Update - VPNFilter exploits endpoints, targets new devices Revision History May 25, 2018: Initial Version June 7, 2018: Added link to June 6, 2018 Cisco Talos blog update on VPNFilter This product is provided subject to this Notification and this Privacy & Use policy. (more)

Posted on 25 May 2018 9:22 pm


TA18-141A: Side-Channel Vulnerability Variants 3a and 4

Original release date: May 21, 2018 | Last revised: May 22, 2018 Systems Affected CPU hardware implementations Overview On May 21, 2018, new variants of the side-channel central processing unit (CPU) hardware vulnerabilities known as Spectre and Meltdown were publicly disclosed . These variants—known as 3A and 4—can allow an attacker to obtain access to sensitive information on affected systems. Description Common CPU hardware implementations are vulnerable to the side-channel attacks known as Spectre and Meltdown. Meltdown is a bug that "melts" the security boundaries normally enforced by the hardware, affecting desktops, laptops, and cloud computers. Spectre is a flaw that an attacker can exploit to force a CPU to reveal its data. Variant 3a is a vulnerability that may allow an attacker with local access to speculatively read system parameters via side-channel analysis and obtain sensitive information. Variant 4 is a vulnerability that exploits “speculative bypass.” When exploited, Variant 4 could allow an attacker to read older memory values in a CPU’s stack or other memory locations. While implementation is complex, this side-channel vulnerability could allow less privileged code to Read arbitrary privileged data; and Run older commands speculatively, resulting in cache allocations that could be used to exfiltrate data by standard side-channel methods. Corresponding CVEs for Side-Channel Variants 1, 2, 3, 3a, and 4 are found below: Variant 1: Bounds Check Bypass – CVE-2017-5753 Variant 2: Branch Target Injection – CVE-2017-5715 Variant 3: Rogue Data Cache Load – CVE-2017-5754 Variant 3a: Rogue System Register Read – CVE-2018-3640   Variant 4: Speculative Store Bypass – CVE-2018-3639 Impact Side-Channel Vulnerability Variants 3a and 4 may allow an attacker to obtain access to sensitive information on affected systems. Solution Mitigation NCCIC recommends users and administrators Refer to their hardware and software vendors for patches or microcode, Use a test environment to verify each patch before implementing, and Ensure that performance is monitored for critical applications and services. Consult with vendors and service providers to mitigate any degradation effects, if possible. Consult with Cloud Service Providers to mitigate and resolve any impacts resulting from host operating system patching and mandatory rebooting, if applicable. The following table contains links to advisories and patches published in response to the vulnerabilities. This table will be updated as information becomes available. Link to Vendor Information Date Added AMD May 21, 2018 ARM May 21, 2018 Intel May 22, 2018 Microsoft May 21, 2018 Redhat May 21, 2018 References Google Project Zero Blog Bounds Check Bypass – CVE-2017-5753 Branch Target Injection – CVE-2017-5715 Rogue Data Cache Load – CVE-2017-5754 Rogue System Register Read – CVE-2018-3640 Speculative Store Bypass – CVE-2018-3639 TA18-004A – Meltdown and Spectre Side-Channel Vulnerability Guidance Revision History May 21, 2018: Initial version May 22, 2018: Added information and link to Intel in table This product is provided subject to this Notification and this Privacy & Use policy. (more)

Posted on 21 May 2018 11:54 pm



What we do and what we offer.

About penetration tests and about our news.